100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SC-900 Security, Compliance, and Identity Fundamentals

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
02-07-2024
Written in
2023/2024

SC-900 Security, Compliance, and Identity Fundamentals

Institution
Course

Content preview

SC-900 Security, Compliance, and Identity
Fundamentals
Physical Security
Identity and Access
Perimeter
Network
Compute
Application
Data - ANS-What are the 6 layers of Microsoft's Defense in Depth security approach?

Verify explicitly
Use lease privileged access
Assume breach - ANS-What are the 3 Zero Trust principles?

Global Data Protection Regulation - ANS-What does GDPR stand for?

Data Breach
Malware
Phishing
Denial of Service - ANS-What are 4 common security threats?

Symmetrical
Asymmetrical - ANS-What are the two types of encryption?

Asymmetrical Encryption - ANS-What type of encryption requires a public and a private
key?

Transport Layer Security - ANS-What does TLS stand for?

Transparent Data Encryption - ANS-What is TDE?

BitLocker - ANS-What is the Windows based data encryption at rest solution?

Digital Signatures - ANS-What is password hash used for?

Microsoft Service Trust Portal - ANS-What provides a variety of content, tools, and other
resources about Microsoft security, privacy, and compliance practices as well as

,contains details about Microsoft's implementation of controls and processes that protect
our cloud services and the customer data therein?

Confidentiality
Integrity
Availability - ANS-What does the CIA stand for?

Data Beach - ANS-What is it referred to when data is stolen?

Dictionary Attack - ANS-What is a type of identity attack where a hacker attempts to
steal an identity by trying a large number of known passwords?

Malware - ANS-What are malicious applications and code that can cause damage and
disrupt normal use of devices?

Ransomware - ANS-What is a type of malware that encrypts files and folders,
preventing access to important files?

Hashing - ANS-What uses an algorithm to convert the original text to a unique
fixed-length hash value?

Password-based attacks - ANS-What includes password spray attacks and brute force
attacks?

Phishing - ANS-Type of attack when a hacker sends an email that appears to come
from a reputable source?

Spear Phishing - ANS-Type of attack where Hackers build databases of information
about users, which can be used to create highly credible emails?

Identity - ANS-What is the primary security perimeter?

Administration
Authentication
Authorization
Auditing - ANS-What are the 4 pillars of identity?

Identity Provider - ANS-With modern authentication, all services, including all
authentication services, are supplied by a central?

, Federation - ANS-What enables the access of services across organizational or domain
boundaries by establishing trust relationships between the respective domain's identity
provider?

Active Directory - ANS-What is a set of directory services developed by Microsoft as
part of Windows 2000 for on-premises domain-based networks?

Active Directory Domain Services - ANS-What stores information about members of the
domain, including devices and users, verifies their credentials, and defines their access
rights?

Free
Office 365
Premium P1
Premium P2 - ANS-What 4 versions is Azure AD available in?

Service Principal - ANS-What is a security identity used by applications or services to
access specific Azure resources?

Managed Identities - ANS-What is automatically managed in Azure AD and typically
used to manage the credentials for authenticating a cloud application with an Azure
service?

System-assigned
User-assigned - ANS-What are the two types of Managed Identities?

Azure AD joined - ANS-What type of devices exist only in the cloud, are owned by an
organization and signed in with their account?

Hybrid Azure AD joined devices - ANS-What type of devices can be Windows 7, 8.1, or
10, or Windows Server 2008, or newer, owned by an organization and signed in with an
Active Directory Domain Services account belonging to that organization.

They exist in the cloud and on-premises.

Azure AD External Entities - ANS-What is a set of capabilities that enable organizations
to allow access to external users, such as customers or partners?

B2B
B2C - ANS-What are the two different Azure AD External Identities?

Written for

Course

Document information

Uploaded on
July 2, 2024
Number of pages
23
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GOLDSOLUTIONS Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
12076
Member since
2 year
Number of followers
61
Documents
17251
Last sold
6 days ago

4.4

118 reviews

5
89
4
9
3
10
2
4
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions